In this paper, we introduce an implementation for detailed monitoring of user actions on web pages. It addresses the problem that the log data recorded by standard web servers is ...
Phishing is a form of identity theft in which an attacker attempts to elicit confidential information from unsuspecting victims. While in the past there has been significant work ...
This study shows that in a qualitative study a small sample size is sufficient to gain interesting results and show differences between the procurement of IT services in different ...
Many anti-phishing schemes have recently been proposed in literature. Despite all those efforts, the threat of phishing attacks is not mitigated. One of the main reasons is that p...
Web search queries capture the information need of search engine users. Search engines store these queries in their logs and analyze them to guide their search results. In this wo...
Ioannis Antonellis, Hector Garcia-Molina, Jawed Ka...